It shields you from the transport layer.
It provides you with a method of tunneling through firewalls.
On the other hand, some cons of this technique are the following:
You must make sure that all your objects and nested objects implement the
Because you are opening a connection with an applet, security issues limit you to con-
necting only to the applet's originating server.
When you start using larger objects or collections of objects, your throughput declines
Because you are using an applet as a client, you must make sure that your users have a
This chapter covered the basics of Java serialization. You created two servlets that serviced
HTTP tunneling requests. You also took a look at applets and applications as HTTP tunneling
clients. At this point, you should be able to create your own servlet that can service HTTP tun-
neling requests. You should understand how to create Serializable objects. You should also
be able to determine when to use (or not use) an applet-to-servlet solution.
In the next chapter, you will look at Java's JDBC. You will first go over a basic introduction to
the JDBC and then examine how you can leverage the JDBC in servlets.